Role-based Security Overview

Security is based on roles, which combine tasks and permissions to determine a user access to feature areas. Admins can create roles in one of three ways:

Note: To effectively assign security, it is important to review each topic in this section to fully understand the framework and its impact on your database. It's also important to review roles often to determine whether you need to adjust for new or changed tasks and permissions.